Personal backgrounds, interviews, motivations, humanizing details
DOJ/FBI/SEC press releases, agency statements, government sources
Project histories, changelogs, developer interviews, open source
Write or review lyrics with professional prosody, rhyme craft, and quality checks
Investigative articles, interviews, news coverage
Visual concepts for album artwork and AI art generation prompts
Scan lyrics for pronunciation risks, prevent Suno mispronunciations
Archives, contemporary accounts, timeline reconstruction
Subject's own words - tweets, blogs, forums, chat logs
SEC filings, earnings calls, analyst reports, market data
Investigative-grade research: primary source analysis, cross-verification, trial-level depth
65 Specialized Skills for Full-Stack Developers - Transform Claude Code into your expert pair programmer
Analyzes, generates, and enhances CLAUDE.md files for any project type using best practices, modular architecture support, and tech stack customization. Use when setting up new projects, improving...
Boilerplate templates for Claude Code extensions. Triggers on: create agent, new skill, command template, hook script, extension scaffold.
This skill should be used when the user asks to "perform SMTP penetration testing", "enumerate email users", "test for open mail relays", "grab SMTP banners", "brute force email credentials", or...
This skill should be used when the user asks to "pentest AWS", "test AWS security", "enumerate IAM", "exploit cloud infrastructure", "AWS privilege escalation", "S3 bucket testing", "metadata...
Complete Claude Code hooks reference - input/output schemas, registration, testing patterns
This skill should be used when the user asks to "pentest SSH services", "enumerate SSH configurations", "brute force SSH credentials", "exploit SSH vulnerabilities", "perform SSH tunneling", or...
This skill should be used when the user asks to "escalate privileges on Linux", "find privesc vectors on Linux systems", "exploit sudo misconfigurations", "abuse SUID binaries", "exploit cron jobs...
This skill should be used when the user asks to "perform cloud penetration testing", "assess Azure or AWS or GCP security", "enumerate cloud resources", "exploit cloud misconfigurations", "test...